Photo AI

1.1 The result of the expression 7 MOD 5 + 10 DIV 3: A B C D 1.1.2 A digital signature is used … A when someone signs an electronic document - NSC Information Technology - Question 1 - 2017 - Paper 2

Question icon

Question 1

1.1-The-result-of-the-expression-7-MOD-5-+-10-DIV-3:--A---B---C---D----1.1.2-A-digital-signature-is-used-…--A-when-someone-signs-an-electronic-document-NSC Information Technology-Question 1-2017-Paper 2.png

1.1 The result of the expression 7 MOD 5 + 10 DIV 3: A B C D 1.1.2 A digital signature is used … A when someone signs an electronic document. B to ident... show full transcript

Worked Solution & Example Answer:1.1 The result of the expression 7 MOD 5 + 10 DIV 3: A B C D 1.1.2 A digital signature is used … A when someone signs an electronic document - NSC Information Technology - Question 1 - 2017 - Paper 2

Step 1

The result of the expression 7 MOD 5 + 10 DIV 3:

96%

114 rated

Answer

To solve the expression, we first calculate each part:

  1. Calculate 7 MOD 5:

    • The remainder when 7 is divided by 5 is 2.
  2. Calculate 10 DIV 3:

    • The integer division of 10 by 3 gives 3 (since 10 divided by 3 equals 3 with a remainder of 1).
  3. Finally, add the two results together:

    • 2 + 3 = 5.

Thus, the answer is D.

Step 2

A digital signature is used …

99%

104 rated

Answer

A digital signature is primarily used to identify the sender of an electronic message (option B). It ensures the integrity and authenticity of the sender.

Step 3

A Trojan virus is designed to …

96%

101 rated

Answer

A Trojan virus is designed to appear useful while actually causing harm, therefore, the correct answer is D.

Step 4

A technique used to make electronic communication appear to originate from a legitimate source is known as …

98%

120 rated

Answer

This technique is referred to as spoofing (option B), which involves impersonating a legitimate source.

Step 5

To establish a relationship between two tables in a database, a link must be made from the …

97%

117 rated

Answer

The link must be made from the primary key to the foreign key (option D) to maintain referential integrity.

Step 6

The amount of data an ISP allows a user to upload and download in a particular time period

97%

121 rated

Answer

This is known as a CAP/Data bundle.

Step 7

A website that is regularly updated with news and events in chronological order

96%

114 rated

Answer

Such a website is referred to as a Blog/Weblog.

Step 8

A person who breaks into a system to steal data electronically or to make unauthorized changes to electronic data

99%

104 rated

Answer

This person is commonly known as a Cracker/Hacker.

Step 9

An Internet service that translates a domain name to an IP address, e.g. www.abcd.com translates to 169.150.100.123

96%

101 rated

Answer

This service is known as DNS (Domain Name System).

Step 10

The protocol used for secure encrypted transfer of data on the Internet

98%

120 rated

Answer

This protocol is referred to as HTTPS/SSL.

Step 11

The process whereby the existing firmware is wiped and replaced by an updated version

97%

117 rated

Answer

This process is known as flashing the ROM.

Step 12

An Internet-based alternative to text messaging, in which multimedia can be exchanged in real time via applications, such as WhatsApp

97%

121 rated

Answer

This is referred to as Instant messaging (IM).

Step 13

A common format for storing digital music by combining efficient compression techniques and good quality sound

96%

114 rated

Answer

This format is known as MP3 (MPEG-1 Audio Layer 3).

Step 14

Gaining unauthorized access to a network and making use of a connection in an unauthorized way to access a secured Wi-Fi network

99%

104 rated

Answer

This practice is known as Piggybacking.

Step 15

The process of self-checking by a computer when it is powered on

96%

101 rated

Answer

This process is known as POST (Power-on self-test).

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;